How to Build a Computer on a $300 Budget Building a great PC on a strict budget is not only possible, it’s much more rewarding than spending the same amount of $$ on a store-bought one-size-fits-most. If you need any help along the way, try an online computer repair service to help. I recommend remote …

Now in the last article I mentioned how some software can negatively impact the performance of your computer. I used, and always use, AOL as an example. There are so many things packed into AOL software, so many of which not a lot of people even use, that this piece of software can be terrible …

Over time, the initially popular and most preferred desktops have been replaced by laptops. Initially, laptops were avoided because of the high price tags attached to them. However, things are a little different in recent days. Advancement in technology has led to the manufacture of lighter, smaller, faster as well as easier to use laptops. …

Linux doesn’t have a large market share on personal computers, but it powers a big chunk of the server world. More than 30 percent of Web sites use Linux as an operating system, W3Techs reports. Linux distributions have a number of advantages over the Windows server environment, such as open source code, better security and …

Hash Algorithms Secure Hash Algorithm (SHA) can be defined as a set of cryptographic hash functions that were created by the National Security Agency (NSA). They were then published by the National Institute of Standards and Technology (NIST) as a United States Federal Information Processing Standard. There are three differently structured SHA algorithms which are …

Building a great PC on a strict budget is not only possible, it’s much more rewarding than spending the same amount of $$ on a store-bought one-size-fits-most. If you need any help along the way, try an online computer repair service to help. I recommend remote computer repair services because the pricing is a lot better than the local guys.

Why is it more rewarding? For starters, you can pack way more power into the components you choose for your pc, because you can pick and choose the best component for your money from different online retailers. This way you’re always getting the best possible value system available in any given month of any year. It’s true that bundled OEM PCs occasionally go on sale, this is even more true for separate parts.

The second reason we prefer building from scratch is that you have total control over your system’s components, so you can build specifically for your needs. You can choose to buy high-performance processor and memory capabilities now to determine high speeds for your new build, and wait until you’ve saved up more or the sales are on to upgrade your graphics card.

We recommend using PCPartPicker for putting your build together. It offers loads of flexibility across products but actively helps prevent you from choosing incompatible components. It also gives you the option to find the best price for each selected item, even if you’ll have to buy some from separate retailers. If you have any trouble putting your new computer together, or run into some processing issues once you’ve got it up and running, just use an online computer repair service to help you troubleshoot the issue. Although they cannot access the computer (via remote computer repair) if it’s not booting, they offer fairly cheap phone tech support at flat rates.

The Parts

We’ve figured that you’ll need a motherboard, CPU, memory, storage, power supply, and a case. The grand total comes in at about $293 USD last time we checked. For that price (assuming you want a Microsoft Windows machine) in stores, you’re most likely going to only be offered the worst brand there is (HP).

The motherboard: We think that the best value for money is the MSI A78M-E35 – AMD A78 Chipset FM2+ MicroATX Motherboard

PCPartPicker actually has a calculation tool that figures out how much power your computer is going to need to handle. This one does the job for all the components of this build- in fact is about three times the power you need, so it will happily accommodate a more powerful graphics card if you decide to add a separate one later.

The case: Rosewill FBM-02 MicroATX Mini Tower Computer Case

This tower is small and lightweight, but large enough that you can fit components without too much difficult. You get USB and audio ports up front, two cooling fans, and comes highly regarded by computer building enthusiasts.

Good luck cracking on with your build and remember that whether you’re a first timer or an old hat at building your own PC, it’s always easy to contact an online computer repair service if you need advice. After you complete your build, we highly recommend a VPN.

Now in the last article I mentioned how some software can negatively impact the performance of your computer. I used, and always use, AOL as an example. There are so many things packed into AOL software, so many of which not a lot of people even use, that this piece of software can be terrible for performance. A lot of customers whose computers I work on still use AOL and I completely advise against it if you’re on an older machine, or a machine lacking memory.

But before we get into that let’s talk about how to check your machines memory, and talk a little bit about how much you should probably have when running certain OS’s (operating systems) and programs. To check your memory you want to right click on “My Computer” (or “Computer,” in Vista and Windows 7.” This will be located either on your desktop (the main screen with your icons when you first start up your PC), or under your start menu (the round ball, as one of my customers calls it, in the bottom left hand corner of your screen on Windows Vista/7). After you RIGHT CLICK “Computer,” you want to left click Properties. Your memory will be displayed here.

Look for installed memory (RAM), or if it doesn’t say this, just look for “KB” “MB” OR “GB” depending on your machine. The number before this abbreviation is how much memory you have. It will also list what version of Windows you have here. Windows XP should have at least 512MB, Vista should probably have at least 3GB and Windows 7 you can probably get away with 2GB but I would prefer 3GB. Memory is fairly cheap these days, especially on Ebay and if you find a tech like me, you can have it installed dirt cheap also.

Now back to software. Things like AOL use a ton of memory. Now unless you have, for example, Windows XP with 1GB of memory, Vista with 4GB of memory, or Windows 7 with 3-4GB of memory, I’d recommend against software like AOL. Other popular software, although getting much better now, is Internet Explorer. Photo editing software uses a lot of memory, Microsoft programs such as Word can use a lot of memory. Suspicious of a memory-hog? Hold “Ctrl,” hold “alt,” then press delete. XP will start your task manager, Windows 7/Vista you’ll have to click to start task manager, but then look under processes. This will list how much memory each software is using.

Now how to replace programs like these? AOL is mainly just used for email and web browsing. This can easily be replaced. Download Firefox (www.firefox.com) to browse the web or Google Chrome (www.google.com/chrome) to browse the web even faster than AOL can handle. Email? This depends on your provider, if you’re using AOL for email, you can cancel AOL, or even keep AOL, and login to your email through www.AOL.COM. Now you’ve replaced this big chunky program without getting rid of your email or web browsing capabilities.

Looking for other software replacements? Stay tuned for part 4 of Speeding Up Your Computer. In the mean time you can check out ways to fix my laptop to find more solutions to speed up your laptops.

Over time, the initially popular and most preferred desktops have been replaced by laptops. Initially, laptops were avoided because of the high price tags attached to them. However, things are a little different in recent days. Advancement in technology has led to the manufacture of lighter, smaller, faster as well as easier to use laptops. The greatest downside to this tremendous progress is that consumers are now spoilt for choice with so many options to choose from. As such, selecting the right one becomes increasingly difficult.

Below are the essential components to consider when choosing a laptop as suggested by Computer Repair experts:

Hard drives: the hard drives for laptops are smaller, yet more expensive compared to the desktop ones. The majority of laptops come with hard drives between 100- 500GB. Unless the laptop is for a professional photographer, or any other profession requiring the storage of large collections of uncompressed files, the standard capacity should do. If a need for additional space is needed, a portable external hard drive can come in handy.

Memory: Typically, the more the RAM, the faster the laptop. Depending on the availability of funds, paying for a laptop with 4 or more gigabytes of RAM is worthwhile. On the other hand, if it’s impossible to meet the budget for the recommended RAM, there should be space for an upgrade in the future. A lot of people don’t take notice of this. As such, the need for an upgrade, comes as a surprise when someone is looking for online computer repair services. Although these services can still help, technicians cannot speed up a computer passed the computer’s hardware limitations. Having a higher RAM allows the laptop user to open more programs at the same time without the computer freezing.

The speed of the processor: in the past, the goodness of a computer was measured almost exclusively by the speed of its processor. Nowadays, the majority of new computers come with processors that sufficiently handle routine tasks such as Internet browsing and office applications. As such, this component is only considered necessary if the laptop is intended for use in data processing, gaming, or video and/or graphic design. If speed is a vital component, higher speeds in Gigahertz or the multi-core options are more appropriate. Any reputable remote computer repair companies, sellers or manufacturers make similar recommendations.

The weight: one of the reasons why laptops came into the picture was to ensure portability. The laptop battery is usually the heaviest part. Of utmost importance is to endeavor to strike a balance between a reasonable weight and durability of the battery. Typically, buyers should be prepared to pay more for lightweight laptops compared to the heavy

Of course, this list isn’t exhaustive. Other components should be considered. With just a few hundred dollars, it is possible to obtain a fast, lightweight and generally powerful laptop.

Linux doesn’t have a large market share on personal computers, but it powers a big chunk of the server world. More than 30 percent of Web sites use Linux as an operating system, W3Techs reports. Linux distributions have a number of advantages over the Windows server environment, such as open source code, better security and lower cost of ownership. When you’re selecting a server operating system for a Linux VPS, you have a variety of distribution options.

1. Debian Linux

Debian Linux is, by far, the most commonly used distribution for servers. There are several reasons why Debian is such a well-loved OS, and why individuals and businesses choose it over commercially supported distributions such as Red Hat. Debian is incredibly stable and doesn’t even need to be rebooted for system updates. Its hardware compatibility is among the best for Linux distributions, so chances good are your server hardware is compatible. The stability and security of Debian are also at the top of the pack, due to extensive package testing and user bug fixing.

2. CentOS/Red Hat Enterprise Linux

CentOS/Red Hat Enterprise Linux are two distributions that go hand-in-hand, although they serve different markets. CentOS is the open source version of Red Hat Enterprise Linux. It is more widely used because users can make changes to the code, it doesn’t require a commercial support package and updates are available more frequently. Red Hat Enterprise Linux has a high cost, but it’s also incredibly stable and reliable due to extensive testing of all packages, kernels and any other OS changes. Red Hat focuses on scalability, cutting down data bottlenecking, conserving power and providing a powerful development platform that is secure and stable. It includes virtualization software as a core part of the operating system, making it perfect for a variety of server functions.

3. Ubuntu Linux

Ubuntu Linux is incredibly well known for its desktop operating system, but it has plenty of benefits for server use. Ubuntu is found on about six percent of Web servers, and it’s gaining popularity in the cloud computing world as well, ZDNet reports. The Long Term Support edition of Ubuntu provides the stability needed for a server environment, but it maintains upgrade-ability by allowing newer kernels to be used if the hardware or software requires it. OpenStack is supported on Ubuntu, making it a shoe-in for the cloud market. Ubuntu has a 2-year upgrade cycle for its long-term support OS, so it takes plenty of time to work out bugs and security issues before releasing any updates.

4. Fedora

Fedora is another Red Hat Linux variant that gets some usage on servers, although it’s primarily designed for desktop usage. It has the advantage of being free and open source, so you get around the support package necessity of the Red Hat Enterprise edition. While it’s not designed specifically for servers, the operating system has plenty of functions that work well in a server environment, such as a stable core and good security. However, its update life cycle is significantly shorter than other Linux distributions, so there is no long-term support in place, which is not an ideal situation for a server.

What Linux distribution do you prefer for your servers? Share in the comments.

Secure Hash Algorithm (SHA) can be defined as a set of cryptographic hash functions that were created by the National Security Agency (NSA). They were then published by the National Institute of Standards and Technology (NIST) as a United States Federal Information Processing Standard. There are three differently structured SHA algorithms which are labeled SHA-0, SHA-1 and SHA-2.

SHA-2 has a set of algorithms in itself distinguished as SHA-224, SHA-256, SHA-384 and SHA-512. The difference between SHA-0 through SHA-512 is the length of the message digest and the hash functions that are used. Each SHA algorithm uses a different number of bits. The SHA-1 is 160 bits, SHA-256 is 256 bits, SHA-384 is 384 bits and so on. SHA-512 is the most secure out of these algorithms because it uses the highest number of bits.

Another type of algorithm is called Message-Digest algorithm 5 (MD5). MD5 has now been cast aside for SHA due to flaws that were found in the design. The main difference between MD5 and SHA is that although MD5 is somewhat faster than SHA, SHA is more secure. The reason for this is because MD5 uses a 128-bit 16-byte digest while SHA uses a 160-bit 20-byte digest.

One way to reverse a hashed password is using something called a rainbow table. A rainbow table can be looked at as a code book for hash functions. It’s created by gathering every possible plain text password (within reason) that fit certain requirements (for example password length and case sensitivity).

The RainbowCrack Project is a time-memory tradeoff hash cracker. This cracker uses these same exact rainbow tables to crack hashes. The brute force hash cracker creates all possible plain text passwords and works out all of the matching hashes at the same time while also comparing it to the target.

All about IDS Evasion Methods & VPN

An Intrusion Detection System (IDS) is a setup of hardware and/or software that was designed to detect unwanted behavior such as attempts to access, immobilize or manipulate a computer system. Behavior like this will come from things such as crackers, disgruntled employees or malware. An IDS system attempts to protect against network attacks, software attacks, unauthorized access to the system, malware and more. Intrusion Detection System evasions techniques are changes that are made to an attack so that it will not be detected by an Intrusion Detection System.

I’m going to describe four different evasion techniques that will avoid an intrusion from being detected. The first one I’m going to describe is known as obfuscating attack payload. In this IDS evasion attack the “attack payload” is obfuscated or encoded so that the intended machine will reverse but the IDS will not. When security wasn’t quite as advanced as it is now, it was possible to encode the attack packet so that the IDS wouldn’t recognize it, allowing it to get to the IIS server which would decode it and then become attacked. This exploit has now been found and sealed up.

Another IDS evasion attack is fragmentation and small packets. How this works is, the attacker splits the packets into multiple segments so that it doesn’t appear as an attack until it is reassembled. The IDS receives, reassembles and then becomes victim to these packets. There are many tools out there which will allow you to split up packets, but due to security reasons these will not be revealed. Splitting packets is done by fragmenting them but packets can also be originally created split up for exactly this reason.

The third IDS evasion technique I’m going to talk about is overlapping fragments. What happens here is a series of packets are created with TCP sequence numbers set to overlap each other. An example of this is having 2 packets, one of them 70 bytes of the attack payload but the other one’s sequence number will be 66 bytes after the start of the first packet. The victim computer then rebuilds the TCP stream and tries to figure out how to deal with the four overlapping bytes. Some machines will take the new data; some will take the older data.

The last technique I will talk about is a resource exhaustion attack. This attack is also known as a DoS attack or denial of service. This attack is done by exhausting or immobilizing the IDS. With this attack you’ll use a bug found in the IDS to use up the computers resources or hide the actual attack by creating a large amount of alerts on the system. IDS alerts can be triggered by sending attack signatures through the network.

The second subject I wanted to get into was VPN and OpenVPN. VPN stands for Virtual Private network. A Virtual Private Network is a network that uses the public infrastructure already set up for things like telecommunications and internet but maintains privacy and security with the use of a tunneling protocol and various other security procedures such as firewalls. A VPN sets up a private or secure network within a public network such as the Internet.

OpenVPN is free VPN related software for creating encrypted tunnels between host computers. This can be done by creating either point to point or server to multiple client connections. OpenVPN can create direct links between systems that are protected by NAT firewalls without even having to reconfigure it.

Intermediate Routing
1. Qualified-next-hop allows unique pref. values for static routes to the same dest.
2. The default next-hop for aggregate and generated routes is 130.
3. The purpose for the Martian address list is for hosts or network addresses to be ignored.
4. Common uses for routing instances are: creating routing tables (used for filter-based forwarding), VPN services, and system virtualization.

1. The default load balancing behavior when equal cost paths exist is choosing one of the paths over which traffic for the received destination prefixes will be sent
2. Load-balance per packet policy action works by traffic spreading across the active equal cost paths randomly, while the forwarding table performs the load distribution. Each packet that matches a destination route is forwarded across a different outbound interface in a round robin fashion.
3. The instance type that FBF uses is that of inet.0.
4. The purpose of the RIB group when configuring FBF is to resolving the routes installed in the routing instances to directly connected next-hops on that interface.

1. The purpose of OSPF LSAs is to create a complete database of the network.
2. The benefits iof segmenting a large single-area OSPF environment into multiple areas are to facilitate growth and scalability which reduces the size of the LSDB
3. The difference between ABR and ASBR is ABR transmits network info btween the backbone and other areas while ASBR injects routing info from the outside the OSPF AS.
4. Common OSPF area types and their functional considerations: NSSA STUB STUB has no external routes. NSSA allows external routes to be flooded within an area.

1. When a routr receives a BGB route with its own AS number in it’s AS path, AS won’t react as quickly as an IGP.
2. The advantages of loop back peering for IBGP sessions is that if a failure occurs, the sessions will not go down because there will be other working links
3. The default BGP advertisements rules are IBGP peers advertise routes received from EBGP peers to the other IBGP peers. EBGP peers advertise routes learned from IBGP/EBGRP peers to other EBGP peers, but IBGP peers do not advertise routes received from IBGP peers to other IBGP peers.
4. Show route receive-protocol bgp neigh, show route advertising-protocol bgp neigh, show route protocol bgp.

1. Common reasons to use IP tunnels: backup links, connect to a company network, connecting networks together over the internet.
2. Diff. between GRE and IP-IP are when configuring them, the interface forms are different, GRE can connect isolated IPv6 networks, IP-IP encapsulates one packet in another packet.
3. The key requirements for GRE and IP-IP tunnels: A tunnel interface is required on each tunnel endpoint. An end to end communication path is required.
4. The route for the remote tunnel endpoint cannot use the tunnel interface as the next hop. If this happens the tunnel will bounce.

1. The basic operations of GR are that it allows uninterrupted packet forwarding and temporary suppression of all routing protocol updates. It also enables a router to pass throuh intermediate convergence states that are hidden from the rest of the network.
2. The key benefit to a graceful routing engine switch over is it allows a Junos device with redundant REs to continue to forward packets even if a RE fails.
3. Benefits of using BFD are rapid detection of link failures and once a BFD session is established, BFD continuously sends “hellos” to monitor the link.
4. The purpose of the virtual router in VRRP is the virtual entity that functions as a default router.

When running a computer repair business it is important to back up your data. You may have critical information relative to your customers. This information may be names and addresses saved for marketing tactics or credit card numbers for customers that are on a billing plan. The information may also just be saved for future reference in case the customer returns for further assistance.
Getting new customers everyday would mean that the data needing to be saved changes everyday, if you were to lose your data you may not be able to contact a customer once their computer is done. This would lead to the customer having to call themselves to see if the machine is fixed. There’s a good chance this client may not return because of this.
A full back up should be done quarterly on whenever business is slowest, with incremental backups done every night at the end of each business day. A full back up quarterly would save a lot of time by not having to reinstall not only personal files that may be on the machine (music, graphics, etc.) but also any operating systems, programs, drivers, utilities and system files too. Incremental backups every night would not only assure that you don’t lose important customer records, but would also grab other useful data also. A full back up could also save you from losing your operating system as well as any updates or patches previously installed.
The only type of network backup I could think of that would be needed in a computer repair business is backing up data to a location outside of the business. For example to a backup server at home or even one hosted by a pay-for company. The advantage of this is if your business was to ever set fire, flood or fall victim to theft, your data would be safe.
If you’re paying a company to hold your data, an upside could be that you don’t have to physically store it anywhere. Other advantages include the chance that the user does not have to change tapes, label CD’s and other manual labor. Companies may also keep a list of versions of your files if you’re paying for your data to be stored.
On the other hand, disadvantages include having to pay the company to store your data (usually a monthly or yearly fee), slower transfer rates, data must be recovered via internet or post office shipment, service providers don’t always guarantee data privacy and, there may be backup limits as well. There are a few disadvantages I’m not going to get into.
Another option you could go about using is an Optical Jukebox. It can load and unload discs such as DVD, Blu-ray, compact and Ultra Density Optical. Information can be saved for up to 100 years and be accessed at high transfer rates. Although Optical Jukeboxes can hold very large capacities of data, using this type of storage used to be more price efficient than it is now due to hard drive storage becoming so cheap.
In larger companies, the amount of users needing access data stored by a Jukebox could become an issue, but due to the nature of a computer repair business, this should not be much of an issue in most cases. Although it could if you’re a company as big as Staples (EasyTech) or Best Buy (Geek Squad), it may take a lot longer to access data depending on the amount of users attempting to gain admission to it. Even with all that said though, optical drives are usually the best option for large quantities of audio, image and video files. Although hard disks have gotten cheap, 100GB of optical disc storage is cheaper in most cases then 100GB of hard drive space.
Now after you explaining a bit better about what you exactly wanted in this paper, and not just going by what was on the Lab…10 sheet was it? I’ve come to realize a little more on point of what you’re looking for. In a computer business with say, 3 locations in the Monmouth County area, I would do a full backup anytime there were any major system updates, or every quarter of a year. As far as incremental updates go, I would probably do incremental updates at the end of each day using something simple like a CD burner. Whoever was to close the shop for the day would be responsible for the update.
Now if I wanted something a little more automated, I would probably just go with an external hard drive at a central location and have all data backed up to there. Maybe even keep it at my home where it’s safe. If anything were to happen to the data, chances are it would still be at the location assuming all 4 (including my home) locations weren’t flooded robbed or set fire.
If data at one location were to go missing, it wouldn’t be that big of a deal because it wouldn’t stop me from running my business. This allows me a lot of free play as far as what option I’d like to choose to backup. I can pretty much just figure out the bare minimum cost of backing up and go with that method. Mohammad said the average life expectancy of a hard drive is five years. With this said I would maybe compare the amount of CD’s I would use per 5 years versus the external hard drive that I would have to replace every 5 years. Obviously as technology advances, the cheaper method may change.
I would use the dump and restore command, not a GUI. To backup a file or directory I would use dump -0uf databackup /home/mat/data. 0 would be a full backup and can obviously be changed, databackup is a backup file and /home/mat/data is the directory for which a backup is created.

To restore: restore -if databack.
The “i” is for interactive mode, “f” is to restore from the specific backup file and databack is a name of backup file/dump file.

Cron file example for backing up daily 11:10pm and on the 5th of every month at 12:05am:
Shell=/bin/bash
Path=/sbine:/bin:/usr/sbin:/usr/bin
MAILTO=root
# HERE IT WOULD RUN DAILY 10 MINUTES AFTER 11PM WHEN SHOPS ARE CLOSED
10 23 * * * $HOM/bin/daily.job >> $HOME/tmp/out 2>&1
# HERE IT WOULD RUN FIVE MINUTES AFTER MIDNIGHT AT THE 5TH OF EVERY MONTH.
5 0 5 * * $HOME/bin/monthly

I so often see the question, “Is online/remote computer tech support safe?” Well let’s look at the facts. As new of an idea as this may seem to you, remote support has been around for years now. The concept isn’t all that complicated once the software is in place. An online computer support technician assists you in downloading remote repair software (if necessary), the PC tech then retrieves a one-time-use code, and then uses this code to connect to your computer.
It’s a quick, convenient process that allows you to avoid the high costs of having a PC support tech come to your home. This also helps you steer clear of having to lug around your computer and mess with a chaos of wires. Not to mention the best part of this all, you’re computer is fixed quickly and right in front of your face! Call up some computer support shops, ask them if you can watch over their shoulder while they speed up your computer (or give your computer a tune-up as some call it). It’d be inconvenient for you and uncomfortable for them. That’s if they even agree to this of course, they may not be able to do this for insurance purposes alone.
Now let’s get to the one of the best parts of online P.C. tech support. Your files and computer are safe! If you take your PC into one of these local shops, do you know how easy it is for them to complete a 5 minute fix, then cause internal damage that will cost you triple, or even quadruple the price? It’s just like those untrustworthy mechanics out there. As sad as it is, they exist. They’re not thinking how maybe if they fix your machine for $30, for those 5 minutes of work, that you’ll be quick to come back time and time again. They’re not thinking how many potential customers they can obtain through word of mouth; they just want that quick $150. There’s nothing stopping them from going elsewhere on their next computer support service needed.
Okay, so your hardware may not be safe, what about your files? Are you sure you want to trust your files in the hands of another? Family photos, tax documents, credit card information, all just some of the stuff a PC support technician could possibly have access to if he desired. With remote PC repair, you can be sure that your hardware is not being swapped out or messed with and that your files are safe. Everything that the online PC support technician is doing is done right in front of your face. With a click or two of your mouse, or a press or two of your keyboard, the technician is locked out. Not that they would try anything with the chance that you’re watching your computer screen of course. Most also offer a “no fix no fee” guarantee!
Remember the case in 2007, where a woman filed a lawsuit against a national computer repair chain whose agent allegedly left a camera phone recording in her bathroom. There are many good people out there; it’s just extremely hard to figure out which ones you’re letting in your home, or giving access to your PC. So what is your safest bet? You’ve got it, online P.C. tech support, also known as remote P.C. tech support, or online computer repair.
Okay so your one of those people that is still hesitant to use your credit card online. In most cases, there’s nothing to worry about. Most online PC tech support sites will transfer your credit card details securely using HTTPS (Hypertext Transfer Protocol Service). So that’s still not good enough? Give your credit card provider a call and ask them how you’re protected against fraud. There’s a good chance you’ll be happy with the response. Ask if you’re responsible for fraudulent charges placed on your card. Credit card providers want you to use them for everything because they get a percentage of each transaction.
Online PC tehc support is affordable too! Low prices don’t always mean a scam or inexperienced service provider, it sometimes means lower overhead costs than renting out a whole store. Would you pay $1500 a month to rent a store if you could spend $500 on a computer and $1000 on a repair website?
Speaking of website, repair isn’t all that is offered by some of these remote tech support service providers. Other services include web design, online computer training and even child safety packages. Need a website for your business? Want to get a little more use out of an expensive computer? Need to keep your teen safe on the internet? Dr. P.C. Repair (http://www.drpcrepair.com & www.doctorpcrepair.com) is just one of a few remote pc repair providers that offer all of these great services.
Are you in need of computer services? How about web design? Try an online P.C. tech support service provider today! Monitor your children on the internet, and all of their internet activity. See who they’re talking to on Facebook and other social networking sites. Finally want to learn to use that computer that you have spent so much money on? Try online pc training! There’s no time better than today, and no safer place to start than a remote pc tech support website! Just be sure to use a company that has a money back guarantee 🙂

One-Time Password Security Measures
One-Time Passwords (OTP’s) are exactly that, passwords that are only used one time. The passwords are generated one of two ways, time synchronized or counter synchronized. Both of these methods use the same algorithm to create the password. The good thing about OTP’s is that it creates strong security. Not only does a person have only 24 hours or less to grab a password, but if they gain access to the password they can only use it for one day. One-time passwords are defense against a hacker eavesdropping on a networks data to retrieve login information. This is known as a replay attack. The downside to one time passwords is the complicity. Users can not remember the passwords therefore they typically require a small piece of hardware that can be kept on a key chain just like a flash drive.
Users not having to remember their passwords can also be a positive thing too though, passwords can no longer be social engineered. Another common security breach that can now be avoided is passwords being written down and stuck onto a monitor or under a keyboard. This common mistake made by employees allows anything who can access the floor, to walk around and collect various passwords. This is a good scenario for using the clip boarding technique. Clip boarding is where an intruder walks around or even gains access to an area he is not authorized to because he is carrying a clip board. The clip board creates the image that the intruder is legit, and is authorized to be at a specific place, and therefore is not questioned.
The major problem before one-time passwords was probably that passwords were cached on the machine and or stored on servers. This enabled anyone who could gain access to the system to pull a password off of it. This was especially worrisome for laptop users because laptops can so easily be stolen, especially if left unattended.
One-time passwords are an amazing idea. Although companies still need to worry about information being social engineered and being stolen by operating system vulnerabilities, passwords being taken because of silly mistakes such as posting them on their monitor or desk can now be avoided. It also prevents more advance attacks such as a system being hacked and its’ passwords being decrypted. OTP’s are just one more step closer to top notch security.

Ports: Their Purpose and Dangers
A port can be defined as a connection point used by software to exchange data. Two of the most common examples of computer ports are TCP and UDP ports. Both of these ports are used to exchange data among computers on the internet. In this paper I will talk briefly about a few select UDP and TCP ports including the purpose for each port, the dangers of having these ports open and how to close these and other computer ports.
The select ports I have chosen to talk about are 137, 138, 139 and 445. Ports 137-139 and 445 are SMB (Server Message Block) ports. They are all used for file and printer sharing. In Windows NT, the SMB protocol ran on top of NetBIOS and in Windows XP/2000/2003, it was made possible to run SMB directly over TCP/IP without the additional layer of NetBT. This is where port 445 replaced 137-139.
Open ports can be dangerous because they are possible back doors into your computer. By keeping these ports open you’re leaving your computer open to any knowledgeable hacker. I would recommend scanning your computer with “Shields Up” (http://www.grc.com/default.htm) to see if these, as well as any other ports are open on your machine.
While Shields Up is an amazing tool for scanning your systems vulnerabilities, it can not close the ports for you. Shields Up does however give you steps on how to close certain ports as well as precautionary measures to avoid closing ports that may have needed to stay open. The best way to find out how to close specific ports on your machine is by doing a search on www.Google.com. For example if the port is 445 that you would like to close, type something along the lines of “how to close port 445” and then follow that by typing your current operating system. There is no single way to close a dangerous port. Each port you need closed may have its own set of directions to close it.